cryptography

共 61 篇文章
cryptography 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 61 篇文章,持续更新中。

10 C++ Books: *C++ Timesaving Techniques For Dummies (2005) *C-C++ Programmer s Reference, 3rd Edi

10 C++ Books: *C++ Timesaving Techniques For Dummies (2005) *C-C++ Programmer s Reference, 3rd Edition (2003) *Creating Games In C++ - A Step By Step Guide (2006) *Cryptography In C And C++ (2001)

CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2

CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2 DOMAIN 2 – ACCESS CONTROL SYSTEMS 7 DOMAIN 3 – TELECOM AND NETWORK SECURITY 13 DOMAIN 4 – CRYPTOG

this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryp

this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.

As3 Crypto is a cryptography library written in Actionscript 3 that provides several common algorith

As3 Crypto is a cryptography library written in Actionscript 3 that provides several common algorithms. This version also introduces a TLS engine (TLS is commonly known as SSL.)

Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996

Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996

a very popular packet of cryptography tools,it encloses the most common used algorithm and protocols

a very popular packet of cryptography tools,it encloses the most common used algorithm and protocols

John.Wiley.&.Sons.Cryptography.for.Dummies.eBook-LiB John wiley & sons 出版的加密算法介绍与入门书籍

John.Wiley.&.Sons.Cryptography.for.Dummies.eBook-LiB John wiley & sons 出版的加密算法介绍与入门书籍

Ad Hoc网是一种不依赖于任何固定基础设施、没有中心控制节点、计算资源受限的新型无线移动网络.基于ECC(elliptic curves cryptography),提出了一个新的适用于Ad Hoc

Ad Hoc网是一种不依赖于任何固定基础设施、没有中心控制节点、计算资源受限的新型无线移动网络.基于ECC(elliptic curves cryptography),提出了一个新的适用于Ad Hoc网的具有口令认证和共享口令进化的多方密钥协商方案.口令的一个功能是作为共享信息认证移动节点的密钥,另一个功能是作为对称密钥加密移动节点间的交互信息.共享口令进化机制保证每次认证节点密钥和协商会话密钥时

浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Inf

浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity ,介绍了Microsoft的最新开发工具Visual Basic 2005(简称VB.NET)中与密码算法相关的System.Security.Cryptog

Handbook of Applied Cryptography CRC Press ISBN: 0-8493-8523-7 October 1996, 816 pages

Handbook of Applied Cryptography CRC Press ISBN: 0-8493-8523-7 October 1996, 816 pages

Handbook of Applied Cryptography CRC Press ISBN: 0-8493-8523-7 October 1996, 816 pages

Handbook of Applied Cryptography CRC Press ISBN: 0-8493-8523-7 October 1996, 816 pages

java source code for cryptography, including all kinds of classes.

java source code for cryptography, including all kinds of classes.

Oreilly_Java_Cryptography EBOOK SOURCE CODE

Oreilly_Java_Cryptography EBOOK SOURCE CODE

Cryptography handbook

Cryptography handbook

The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which impl

The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which implements an extensible provider model that allows you to load a provider by specifying the required cr

applied cryptography ebook by bruce scheneier

applied cryptography ebook by bruce scheneier

THIS IS GOOD PROJECT OF CRYPTOGRAPHY

THIS IS GOOD PROJECT OF CRYPTOGRAPHY

Handbook of Applied Cryptography (Algorithms, Mathematics, Science, Source Code)

Handbook of Applied Cryptography (Algorithms, Mathematics, Science, Source Code)

Java Cryptography and source code

Java Cryptography and source code

using System.Security.Cryptography

using System.Security.Cryptography